• (Solved)Snort ACL exist?

    3
    0 Votes
    3 Posts
    682 Views
    perikoP

    @bmeeks reading learning, thanks again!!!

  • Snort - not working with HTTPs urls/IPs

    2
    0 Votes
    2 Posts
    270 Views
    bmeeksB

    @sandeep335577 said in Snort - not working with HTTPs urls/IPs:

    I am using snort with my pfsense. I have added two IPs(By doing ping command for two different sites) in my IP lists file section and then marked the file as a blacklist file inside wan/lan. When i try to open non-https urls it gets blocked but the url with https doesnt get block.

    My first suspicion is that the two URLs are actually resolving to different IP addresses (but that would definitely be weird if they are supposedly the same site). Snort does not care about the protocol at all when using an IP blacklist. It only goes by the IP address.

  • Allow some LAN IPs bypass snort?

    4
    0 Votes
    4 Posts
    2k Views
    bmeeksB

    You can use the IP Reputation feature to accomplish this. First, upload an IP list containing the IP addresses of hosts you wish to exempt from Snort rules. You do this on the IP LISTS tab of the Snort GUI. Next, go to the LAN INTERFACE SETTINGS tab in Snort and edit the LAN interface. Choose the IP REP tab. There you will enable whitelisting by adding/selecting the IP list you uploaded earlier. Details on Snort whitelisting and blacklisting can be found in the Snort docs here.

  • How to test Snort LAN protection

    5
    0 Votes
    5 Posts
    2k Views
    T

    Perfect. That's what I needed to know. Now I have a new project to work on. Thanks!

    I'm already running my pfSense firewalls on HyperV. I don't have any unused physical ports, unless I un-team some. However, I'm sure I could simply add another internal network to my pfSense VM and connect the Kali Linux VM that way. I'll figure out something. Again, thanks.

  • Detect using proxy browser extension in local area network

    4
    0 Votes
    4 Posts
    549 Views
    johnpozJ

    Hey is saying that since there is detection listed for it ciscos VDB, that there is prob a rule... My guess would be openappid could be used to detect it.

  • Use Snort or Suricata to populate pfSense Alias?

    2
    0 Votes
    2 Posts
    436 Views
    bmeeksB

    You cannot populate aliases with either the Snort or Suricata packages. They are just not designed for that purpose. Also, Suricata does not have a DPI equivalent of Snort's OpenAppID feature.

    If I understand what you are wanting to do, I know of nothing that can do that. Sounds like you want to dynamically route traffic depending on the packet type (after a Layer 7 deep packet inspection to identify the underlying app protocol).

  • Suricata RAM for multiple processors/cores?

    2
    0 Votes
    2 Posts
    1k Views
    bmeeksB

    A high core count CPU like you have will definitely need more memory allocated for the TCP Stream Memory Cap. With 8 cores I would start with 256 MB and test upwards from there. The parameter is found on the FLOW/STREAM tab.

    View the suricata.log file for the interface on the LOGS VIEW tab to see if you are hitting a Stream Memory Cap limit.

  • Suricata 4.1.3 is available at freshports

    4
    0 Votes
    4 Posts
    275 Views
    bmeeksB

    The pull request to update the Suricata package to 4.1.3 has been posted for the pfSense developer team to review and merge into pfSense-2.5 DEVELOPMENT. Here is the link: https://github.com/pfsense/FreeBSD-ports/pull/631.

  • Cant enable Suricata on all interfaces

    5
    0 Votes
    5 Posts
    1k Views
    M

    Thought i would post for my own reference and anyone else with this problem.... Rebooting the firewall results in Suricata listening on all interfaces with 1 instance (startup). So, the problem fixed itself.

  • pfsense snort & suricata about

    Moved
    2
    0 Votes
    2 Posts
    2k Views
    Joe FridayJ

    Yes, Snort and Suricata are IDS/IPS packages that can be used in pfSense. Google would be a great place to compare features and differences. (Lots of reading available on the subject)

    If you are trying out either for the first time, BMeeks posted a reply to a question for another user trying out Snort that may be of some use for you. (another good read):
    https://forum.netgate.com/topic/141743/best-rules-to-best-protection-in-wan-and-lan-interface/2

  • 'SURICATA STREAM pkt seen on wrong thread' when using workers run mode

    3
    0 Votes
    3 Posts
    1k Views
    bmeeksB

    Hmm... that sounds like something you might want to ask the upstream Suricata team. I'm not sure of its significance. The Suricata bug reporting/issues site is here: https://redmine.openinfosecfoundation.org/projects/suricata.

    When giving them your configuration, tell them you are using inline IPS mode with netmap on FreeBSD. If you are on pfSense 2.4.x, then the FreeBSD version is 11.2; if you are using pfSense-2.5-DEVEL, then the FreeBSD version is 12.0.

  • Snort v3.2.9.8_5 - Release Notes

    1
    0 Votes
    1 Posts
    207 Views
    No one has replied
  • snort does not block

    5
    0 Votes
    5 Posts
    836 Views
    P

    @bmeeks

    thanks a lot!

  • False Positive?

    4
    0 Votes
    4 Posts
    956 Views
    K

    Thank you both for your input. Yes this will be a huge learning curve for me. I will keep on analyzing.

  • Limit what Snort listens to

    5
    0 Votes
    5 Posts
    574 Views
    R

    I'll probably just run anti-malware then and front everything in the DMZ with a WAF. I already have it behind NGINX and cloudflare. Thanks for the help!

  • Still seeing suricata stop an interface due to .pid error

    38
    0 Votes
    38 Posts
    6k Views
    V

    @bmeeks said in Still seeing suricata stop an interface due to .pid error:

    @val said in Still seeing suricata stop an interface due to .pid error:

    @bmeeks

    PM you the log file....it's way to big to post here.

    Thanks bmeeks.

    I looked through you log file. What version of the Snort Rules Snapshot file are you using? You should be using only rules packages for Snort 2.9.x if you are running Snort rules with Suricata. Your file name should be snortrules-snapshot-29120.tar.gz. Do not use the Snort3 rules (that means do not use any Snort rules file with 3 in the name). You should not be seeing those "unknown reference" error messages. The only time I've noticed those is when the user has downloaded the rules meant for use only with the new Snort3 beta package from the Snort team.

    Hi bmeeks
    I have since moved away from suricata backon Snort for now, my internet connection it's through an PPPoE connection so from my understanding suricata doesn't play well with PPPoE.

    I have tried few difference thing all result the same suricata still kill it self and wouldn't start again til I delete the pid file.

    Thanks for all the help.

  • Snort not starting on pfsense 2.4.4 release p1

    5
    0 Votes
    5 Posts
    743 Views
    NogBadTheBadN

    If you can't figure out how !any got there, i'd be tempted to remove snort after unticking Keep Snort Settings After Deinstal then do a re install.

    I'd follow these steps to configure snort as written by @bmeeks who maintains the snort package.

    https://forum.netgate.com/topic/55095/quick-snort-setup-instructions-for-new-users/147

  • Suricata Inline Mode Not Blocking

    2
    0 Votes
    2 Posts
    899 Views
    bmeeksB

    Netmap is not likely to play very well with a transparent firewall bridge setup, especially with the way netmap is currently implemented within Suricata. Some improvements are planned upstream for netmap, but there is not yet a timetable for their release.

    Also note that Suricata will not work properly with a PPPoE type interface. I mention that because that is a popular type of setup for a WAN. The most popular is DHCP, but there are lots of PPPoE connections. The least popular setup is a static IP on the WAN.

    If you want to continue with the transparent firewall arrangement, I recommend you use Legacy Mode blocking.

  • How to grant a snort port permission?

    2
    0 Votes
    2 Posts
    164 Views
    bmeeksB

    I am a little confused with this part of your question: the people I get support do not use static ip so I can ignore the requests coming to the port as I choose where and how to write a rule.

    I suspect English is perhaps a second language for you, and as a native English speaker, I'm having trouble following your chain of thought. Do you mean that your VoIP provider's endpoint server has a dynamic IP address or do you mean your end of the connection has a dynamic IP address?

    If you are dealing with a dynamic IP address, then preventing a block by IP is not possible. Snort can't deal with changing IP addresses within a Pass List. Why don't you just disable the Snort rule that is causing the block? You can do that on the ALERTS tab.

  • Snort showing date in wrong format

    1
    0 Votes
    1 Posts
    141 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.